Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
38f9027db5db0e80bf54fd0b58834c4e41832fcb5823de688e73b8729c320252.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38f9027db5db0e80bf54fd0b58834c4e41832fcb5823de688e73b8729c320252.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
lbkefhzm.exe
Resource
win7-20240704-en
General
-
Target
lbkefhzm.exe
-
Size
194KB
-
MD5
df94c0e13e9170afcde2c5fed16a3600
-
SHA1
1190674c6027614ba60ae23d44f469707ec500fc
-
SHA256
2610d8a1362ee28e59bc811d63e8d5c63e6021f94635be9a6c0921c6e62c98b2
-
SHA512
85a0ff0bf2824ac55430dddf967a02ebfc9145159255b148cced9aafc277b66dbc02fad97270fcb7b96a81b378a14ebd10d642884f05347b6278a5f6025a98f0
-
SSDEEP
3072:yDM3BbjHUffrVYDdJuNFS+gwRiz+iGxKmlGsEgSYRIuAg0FujwZ3UMk53:yDIKr0Pu7SPy4+i3MAOGI3
Malware Config
Extracted
nanocore
1.2.2.0
multipleentry90dayscontroller.homingbeacon.net:54980
6df769ca-fa90-4d27-be6c-663c699e6628
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-07-28T11:56:28.201018636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54980
-
default_group
K59
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
6df769ca-fa90-4d27-be6c-663c699e6628
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
multipleentry90dayscontroller.homingbeacon.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwsscwwgp = "C:\\Users\\Admin\\AppData\\Roaming\\lhhqavvfo\\okttpyiien.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\lbkefhzm.exe\"" lbkefhzm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NAT Subsystem = "C:\\Program Files (x86)\\NAT Subsystem\\natss.exe" lbkefhzm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lbkefhzm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 380 set thread context of 736 380 lbkefhzm.exe 86 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAT Subsystem\natss.exe lbkefhzm.exe File opened for modification C:\Program Files (x86)\NAT Subsystem\natss.exe lbkefhzm.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1164 380 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbkefhzm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbkefhzm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 736 lbkefhzm.exe 736 lbkefhzm.exe 736 lbkefhzm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 736 lbkefhzm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 380 lbkefhzm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 736 lbkefhzm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 380 wrote to memory of 736 380 lbkefhzm.exe 86 PID 380 wrote to memory of 736 380 lbkefhzm.exe 86 PID 380 wrote to memory of 736 380 lbkefhzm.exe 86 PID 380 wrote to memory of 736 380 lbkefhzm.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 7002⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 380 -ip 3801⤵PID:2016